We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2022-49823

ata: libata-transport: fix error handling in ata_tdev_add()



Description

In the Linux kernel, the following vulnerability has been resolved: ata: libata-transport: fix error handling in ata_tdev_add() In ata_tdev_add(), the return value of transport_add_device() is not checked. As a result, it causes null-ptr-deref while removing the module, because transport_remove_device() is called to remove the device that was not added. Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0 CPU: 13 PID: 13603 Comm: rmmod Kdump: loaded Tainted: G W 6.1.0-rc3+ #36 pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : device_del+0x48/0x3a0 lr : device_del+0x44/0x3a0 Call trace: device_del+0x48/0x3a0 attribute_container_class_device_del+0x28/0x40 transport_remove_classdev+0x60/0x7c attribute_container_device_trigger+0x118/0x120 transport_remove_device+0x20/0x30 ata_tdev_delete+0x24/0x50 [libata] ata_tlink_delete+0x40/0xa0 [libata] ata_tport_delete+0x2c/0x60 [libata] ata_port_detach+0x148/0x1b0 [libata] ata_pci_remove_one+0x50/0x80 [libata] ahci_remove_one+0x4c/0x8c [ahci] Fix this by checking and handling return value of transport_add_device() in ata_tdev_add(). In the error path, device_del() is called to delete the device which was added earlier in this function, and ata_tdev_free() is called to free ata_dev.

Reserved 2025-05-01 | Published 2025-05-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

d9027470b88631d0956ac37cdadfdeb9cdcf2c99 before ef2ac07ab83163b9a53f45da20e14302591ad9cc
affected

d9027470b88631d0956ac37cdadfdeb9cdcf2c99 before f23058dc2398db1d8faca9a2b1ce30b85cdd8b22
affected

d9027470b88631d0956ac37cdadfdeb9cdcf2c99 before f54331962883f4fc4bf5e487e6e7cf07c4567fef
affected

d9027470b88631d0956ac37cdadfdeb9cdcf2c99 before 1ff36351309e3eadcff297480baf4785e726de9b
affected

Default status
affected

2.6.37
affected

Any version before 2.6.37
unaffected

5.10.156
unaffected

5.15.80
unaffected

6.0.10
unaffected

6.1
unaffected

References

git.kernel.org/...c/ef2ac07ab83163b9a53f45da20e14302591ad9cc

git.kernel.org/...c/f23058dc2398db1d8faca9a2b1ce30b85cdd8b22

git.kernel.org/...c/f54331962883f4fc4bf5e487e6e7cf07c4567fef

git.kernel.org/...c/1ff36351309e3eadcff297480baf4785e726de9b

cve.org (CVE-2022-49823)

nvd.nist.gov (CVE-2022-49823)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2022-49823

Support options

Helpdesk Chat, Email, Knowledgebase